Posts Tagged: accessed

Mint Mobile says hackers accessed customer information during a security breach

Mint Mobile, the prepaid mobile carrier backed by Ryan Reynolds, notified customers via email this weekend that their information may have been stolen in a security breach, according to BleepingComputer. That information includes names, phone numbers, email addresses, plan descriptions, and SIM and IMEI numbers — which could be used for SIM swap attacks.

After a Reddit user posted a screenshot of the email and questioned if it was a scam, the Mint account responded to confirm its validity and said a customer support number has been set up to handle questions about the breach. Hackers did not access customers’ credit card information, which Mint says is not stored, nor were passwords compromised, BleepingComputer reports. The company also said it has since resolved the breach and customers do not need to take any action.

This article originally appeared on Engadget at https://www.engadget.com/mint-mobile-says-hackers-accessed-customer-information-during-a-security-breach-185215800.html?src=rss
Engadget is a web magazine with obsessive daily coverage of everything new in gadgets and consumer electronics

23andMe hackers accessed ancestry information on millions of customers using a feature that matches relatives

An SEC filing has revealed more details on a data breach affecting 23andMe users that was disclosed earlier this fall. The company says its investigation found hackers were able to access the accounts of roughly 0.1 percent of its userbase, or about 14,000 of its 14 million total customers, TechCrunch notes. On top of that, the attackers were able to exploit 23andMe’s opt-in DNA Relatives (DNAR) feature, which matches users with their genetic relatives, to access information about millions of other users. A 23andMe spokesperson told Engadget that hackers accessed the DNAR profiles of roughly 5.5 million customers this way, plus Family Tree profile information from 1.4 million DNA Relative participants.

DNAR Profiles contain sensitive details including self-reported information like display names and locations, as well as shared DNA percentages for DNA Relatives matches, family names, predicted relationships and ancestry reports. Family Tree profiles contain display names and relationship labels, plus other information that a user may choose to add, including birth year and location. When the breach was first revealed in October, the company said its investigation “found that no genetic testing results have been leaked.” 

According to the new filing, the data “generally included ancestry information, and, for a subset of those accounts, health-related information based upon the user’s genetics.” All of this was obtained through a credential-stuffing attack, in which hackers used login information from other, previously compromised websites to access those users’ accounts on other sites. In doing this, the filing says, “the threat actor also accessed a significant number of files containing profile information about other users’ ancestry that such users chose to share when opting in to 23andMe’s DNA Relatives feature and posted certain information online.”

Following the discovery of the breach, 23andMe instructed affected users to change their passwords and later rolled out two-factor authentication for all of its customers. In another update on Friday, 23andMe said it had completed the investigation and is notifying everyone who was affected. The company also wrote in the filing that it “believes that the threat actor activity is contained,” and is working to have the publicly-posted information taken down.

Update, December 2 2023, 7:03PM ET: This story has been updated to include information provided by a 23andMe spokesperson on the scope of the breach and the number of DNA Relative participants affected.

This article originally appeared on Engadget at https://www.engadget.com/23andme-hackers-accessed-ancestry-information-from-thousands-of-customers-and-their-dna-relatives-205758731.html?src=rss
Engadget is a web magazine with obsessive daily coverage of everything new in gadgets and consumer electronics

Nintendo says 140,000 more NNID accounts have been illegally accessed

Nintendo shut down NNID logins back in April after it discovered hackers had compromised some 160,000 accounts using legacy credentials. Now, the company says that figure was more like 300,000. In a Japanese language statement posted today, Nintendo…
Engadget RSS Feed